说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 句库 -> 计算机犯罪取证
1.
Analysis on Technology of IP Trace Back
计算机犯罪取证学之入侵追踪技术分析
2.
An Exploration on Opening Curriculum of Seeking Evidence of Computer Crimes in Public Security Colleges;
在公安高校开设计算机犯罪取证课程的探索
3.
The first step of Computer Forensic is solidification of suspect data.
计算机犯罪证据的固定是计算机取证的第一步。
4.
Computer Forensics in Crime Investigation--A Study of Computer Evidence;
计算机犯罪侦查取证技术——计算机证据研究
5.
The Application of Computer Forensic Technology for Investigation;
计算机犯罪现场中的取证技术及应用
6.
The IDS-based Computer Crime Evidence Dynamic Forensics Technology Research;
基于IDS的计算机犯罪证据动态取证技术研究
7.
On Means of Obtaining Electronic Evidence after the Criminal Invasion of the Computer System;
计算机系统遭到犯罪入侵后的电子证据取证
8.
The safety audition s tracking and obtaining evidence to the computer crime;
试论安全审计对计算机犯罪的追踪取证
9.
Based on the Crime Profiling Research of Computer Forensics Analysis Method
基于犯罪画像的计算机取证分析方法研究
10.
The Consolidation and Extraction of the Evidences from the Investigation of Computer Criminal Scene;
计算机类犯罪现场勘查中证据的固定与提取
11.
The Comprehensive Application of Computer Forensic Technology in Detecting Computer Crimes;
计算机取证技术在犯罪案件侦破中的综合应用
12.
It is important to fusion crime evidence from IDS and Firewall.
融合各个方面的犯罪证据成为计算机取证研究的一个主要内容。
13.
The Rule of Evidence Collection in Computer Crime Investigation--from the Perspective of Improving Rules of Related Evidence;
论计算机犯罪侦查的取证规则——以相关证据规则完善为视角
14.
obtain access to computer with criminal or dishonest intent
有犯罪或不诚实意图而取用计算机
15.
modus operandi search and identification by computer
犯罪手法计算机分析
16.
Obtaining Evidence and Clues on Computer-related Crime from Unseen Data;
从不可见数据获得计算机犯罪证据和线索
17.
Research on the Criminal Objects of the Crime of Sabotaging a Computer System;
破坏计算机信息系统罪犯罪对象研究
18.
Modus Operandi Search and Identification by Computer Data Form
犯罪手法计算机分析资料表格